Abstract

With the rapid increase in the demand for Wireless Sensor Network (WSN) applications. The intrusive activities are also raised. To save these networks from the intruders it is required to understand the implications of any malicious act. Most of the researchers have utilized simulated software to understand the impact of such intrusions, however, real network conditions vary from the simulated environment. Therefore, the current work focuses on analyzing the impact of network layer attacks in real-time WSN testbed. The contributions of this work are threefold. Firstly, it presents the deployment of a real-time experimental testbed using standardized sensor devices in a multi-hop topological arrangement. Secondly, it provides the implementation details of seven network layer attacks: Blackhole (BH), Dropping Node (DN), Drop Route Request (DRREQ), Drop Route Reply (DRREP), Drop Route Error (DRERR), Grayhole (GH) and Sinkhole (SH) in a single testbed. Finally, the testbed performance with and without each attack is monitored and compared in terms of network performance metrics to understand the attacks’ impact. This work will be helpful for the research community for proposing efficient attack detection and prevention solutions for these networks.

Highlights

  • Wireless Sensor Network (WSNs) is a widely used technology in most of the monitoring applications nowadays

  • The results show the impact of each attack with respect to the legitimate network performance in terms of identified performance metrics

  • The study presents the implementation of seven network layer attacks on a single testbed

Read more

Summary

Introduction

Wireless Sensor Network (WSNs) is a widely used technology in most of the monitoring applications nowadays. The basic aim of all of its applications is to monitor the sensing environment and send the sensor readings to the base station so that the appropriate actions can be taken on time. Data from the sensor nodes is quite important for mission-critical applications [1]. To achieve these applications’ goals, the deployed sensor nodes should monitor the environment and communicate with other network devices timely. As a result of which, sensor nodes can not communicate with each other and the network performance degrades drastically. To prevent such networks from degradation, these attacks’ impact should be monitored carefully

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.